lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <cover.1468527351.git.luto@kernel.org>
Date:	Thu, 14 Jul 2016 13:22:48 -0700
From:	Andy Lutomirski <luto@...nel.org>
To:	x86@...nel.org
Cc:	linux-kernel@...r.kernel.org, Brian Gerst <brgerst@...il.com>,
	Borislav Petkov <bp@...en8.de>,
	Andy Lutomirski <luto@...nel.org>
Subject: [PATCH 00/11] x86: misc prep patches for virtually mapped stacks

Hi Ingo-

Here are eleven miscellaneous, mostly standalone x86 patches that I pulled
from the virtually mapped stack patch set.  They're based on 4.7-rc6, and
I imagine they apply cleanly on most or all -tip branches.

Once these land, I'll see if the THREAD_INFO_IN_TASK stuff splits out
cleanly as well.  That code certainly needs a couple of these patches,
but I think it might get stuck behind "signal: Consolidate
{TS,TLF}_RESTORE_SIGMASK code", and I asked akpm to queue that one for
-mm.

Andy Lutomirski (10):
  x86/cpa: In populate_pgd, don't set the pgd entry until it's populated
  x86/mm: Remove kernel_unmap_pages_in_pgd() and
    efi_cleanup_page_tables()
  x86/dumpstack: Try harder to get a call trace on stack overflow
  x86/dumpstack/64: Handle faults when printing the "Stack:" part of an
    OOPS
  x86/mm/64: In vmalloc_fault(), use CR3 instead of current->active_mm
  x86/dumpstack: When OOPSing, rewind the stack before do_exit()
  x86: Move uaccess_err and sig_on_uaccess_err to thread_struct
  x86: Move addr_limit to thread_struct
  x86/smp: Remove stack_smp_processor_id()
  x86/smp: Remove unnecessary initialization of thread_info::cpu

Ingo Molnar (1):
  x86/mm/hotplug: Don't remove PGD entries in remove_pagetable()

 arch/x86/entry/entry_32.S             | 11 +++++++++++
 arch/x86/entry/entry_64.S             | 11 +++++++++++
 arch/x86/entry/vsyscall/vsyscall_64.c |  6 +++---
 arch/x86/include/asm/checksum_32.h    |  3 +--
 arch/x86/include/asm/cpu.h            |  1 -
 arch/x86/include/asm/efi.h            |  1 -
 arch/x86/include/asm/pgtable_types.h  |  2 --
 arch/x86/include/asm/processor.h      | 20 ++++++++++++-------
 arch/x86/include/asm/smp.h            |  6 ------
 arch/x86/include/asm/thread_info.h    |  9 ---------
 arch/x86/include/asm/uaccess.h        | 10 +++++-----
 arch/x86/kernel/asm-offsets.c         |  4 +++-
 arch/x86/kernel/cpu/common.c          |  2 +-
 arch/x86/kernel/dumpstack.c           | 20 +++++++++++++++++--
 arch/x86/kernel/dumpstack_64.c        | 12 ++++++++++--
 arch/x86/kernel/smpboot.c             |  1 -
 arch/x86/lib/copy_user_64.S           |  8 ++++----
 arch/x86/lib/csum-wrappers_64.c       |  1 +
 arch/x86/lib/getuser.S                | 20 +++++++++----------
 arch/x86/lib/putuser.S                | 10 +++++-----
 arch/x86/lib/usercopy_64.c            |  2 +-
 arch/x86/mm/extable.c                 |  2 +-
 arch/x86/mm/fault.c                   |  4 ++--
 arch/x86/mm/init_64.c                 | 27 -------------------------
 arch/x86/mm/pageattr.c                | 37 ++++++-----------------------------
 arch/x86/platform/efi/efi.c           |  2 --
 arch/x86/platform/efi/efi_32.c        |  3 ---
 arch/x86/platform/efi/efi_64.c        |  5 -----
 drivers/pnp/isapnp/proc.c             |  2 +-
 lib/bitmap.c                          |  2 +-
 30 files changed, 108 insertions(+), 136 deletions(-)

-- 
2.7.4

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ